GSMK CryptoPhone Baseband Firewall Technical Briefing

Size: px
Start display at page:

Download "GSMK CryptoPhone Baseband Firewall Technical Briefing"

Transcription

1 GSMK CryptoPhone Baseband Firewall Technical Briefing Preface The GSMK CryptoPhone Baseband Firewall (BBFW for short) in GSMK CryptoPhone secure mobile phones from the 500 Series onwards has been designed to provide protection against attempts to exploit the baseband processor (BP) over the air, and alert the user to network conditions that are indicative of a likely attempt to use active intercept techniques commonly known as IMSI catcher attacks. The BBFW consists of a series of heuristics and detection functions 1 that can be separated into two distinct parts: BP behavior anomaly detection Network anomaly detection In this document, the warnings and alerts generated by both functional parts of the BBFW as well as the respective technical and tactical rationale for the selection of detection methods will be outlined. The BBFW also logs a number of events that are not indications of a hostile situation but that provide context for other events to either skew the classification towards normal behavior or suspicious event. 1. General classification of events & reboots In the graph display of the BBFW, the time sequence of events on the air interface is shown in different colors: The color white represents normal events, green represents non-suspicious events, yellow represents possible suspicious events, red represents suspicious events. You can go to the log-list for the desired period of time by long-pressing in the respective area of the graph (cf. Figure 1). Events on the air interface are aggregated into a network confidence bar graph (cf. Figure 2) that provides an intuitive representation of the aggregate risk of the network situation and the likelihood that the BP has been exploited. The sensitivity configuration of the BBFW is tuned towards trigger happy, meaning that it errs on the side of caution in respect to warnings and alerts. Depending on the network operator configuration, the number of false positive events can be higher or lower. 1 Please note that most of the functionality described in this manual is covered by various U.S. and European patents held by GSMK, including US

2 The BBFW evaluates the density and severity of suspicious events over time. Once a certain level of suspicious events per hour (default: 8 events per hour, this is user configurable) has been reached, the BP will be reset to get rid of any potential RAM resident exploit code 2. Figure 1 - BBFW Chart Statistics on the number of events in each category are displayed in the BBFW screen. Network anomalies are considered persistent events since they reflect a condition of the network situation. Figure 2 - BBFW Bar Graph 2. Baseband processor behavior anomaly detection 2.1. Introduction Exploitation of the BP over the air has become a growing concern due to the fact that recent security research has shown that the firmware of all currently used BPs contains a substantial number of bugs that can be exploited by various means, also over the air. If an attacker can gain access to the BP to the extent of being able to execute code on the BP of a secure phone, then he can circumvent or bypass a number of security functions, including access to the phone s application processor (AP) memory, which may contain valuable secrets like clear text or encryption keys. BP firmware is proprietary and is commonly not available in source code for security analysis and bug fixing. In addition, a BP firmware image contains critical functionality for radio communication with the mobile network that is subject to regulations and certifications. This means that even if it were technically possible to audit and fix bugs for a specific BP image, it would most likely need to be recertified if the fix touches part of the software stack that is communicating with 2 Research by GSMK has shown that in the presence of the security measures taken on the GSMK CryptoPhone 500 series, it is very difficult for a BP exploit to become flash-resident and survive a BP reboot

3 the mobile network. Re-certification is a time-consuming and expensive process, which is one of the reasons why the BP manufacturers have a relatively slow cycle of security updates. An exploitable bug that is reported to a BP manufacturer first needs to go into their internal bug fixing cycle, and then the fix needs to make it into the next release of the BP firmware. This release is then handed over to the phone manufacturer that applies its own configuration and parameterization and decides based on its own economic criteria when to release a new BP firmware image for a certain phone. Frequently only updates that provide better data throughput or longer battery life are pushed out for phones that already have been released. Security fixes make it out more often by accident in maintenance releases for user relevant bugs then in specific security fix releases. The fixing process can take many months, and usually only the next phone model in the pipeline receives a fresh BP firmware image. Users of older phones are frequently stranded with security bugs that are never fixed during the service lifetime of their device. This situation created the need for a software component on the GSMK CryptoPhone 500 that through external observation of the BP behavior looks for indications of a successful BP exploitation Correlation between AP intentions and BP activity One primary set of heuristics is the analysis of the correlation between network usage caused by applications running on the AP and resulting network usage as observed on the BP. The rationale is that one common modus operandi for an attacker who got exploit code running on the BP is to exfiltrate data, or to cause the BP to work as a room bug. These malicious functions cause BP activity that is not motivated by applications running on the AP requesting network activity. The inherent challenge of this correlation heuristic is of course to distinguish between autonomous (not AP-related) network activity of an exploited BP and legitimate traffic caused by normal BP-internal functions like e.g. AGPS updates that are not directly visible to the AP. The rules that govern the BP - AP correlation are the following: a) When there is BP data activity, there also should be OS data activity. Rationale: if the BP would have been exploited, then the attacker would likely try to exfiltrate data to the outside world b) When there is BP phone activity, within some interval there also should be OS phone activity or SMS activity, or within 1s data activity. Rationale: The BP setting up a traffic channel for voice or SMS without corresponding AP activity is suspicious and a possible sign of BP exploitation (SMS are sometimes delivered via data, depending on network configuration)

4 c) When there is BP control channel or SMS activity, within a short period there also should be AP data activity / SMS activity. Rationale: BP activity should be reflected on the AP side in order to be nonsuspicious (incoming SMS, kept alive data contexts) d) Check that BP data activity ended at the same time when AP data activity ends. Rationale: A clever attacker with the capability to execute code on the BP could wait for legitimate data usage and exfiltrate data either directly afterwards or at the same time 3. e) Check that BB phone activity ended at the same time when AP phone activity ended. Rationale: An attacker could keep an existing voice channel open even while the AP-side app thinks it has been closed, using the phone as a room-bug. f) If an incoming call is off hook, then the user must have answered it. Rationale: The BP should never accept an incoming voice call without user interaction. If that happens, there is a very high likelihood of a successful attack against the BP. It is of critical importance to understand that the analysis of BP behavior in correlation to the AP is a statistical function. Individual warnings of suspicious events do not necessarily indicate a successful BP exploit, or the presence of an IMSI-catcher. A high number of these events under otherwise normal network conditions would however be a strong indication that something is wrong. From tests and user experience under attack conditions it is known that a common technique the opening of a traffic channel without content transmission is frequently used to facilitate further attacks. When a malicious base station is in the area, which will likely trigger persistent events regarding encryption etc., also noncorrelation between AP and BP activity very often happens. It should be noted, however, that under sub-optimal network conditions (like the combination of legitimate roaming and bad network), there can be a high frequency of warnings that are just artifacts of the network situation. In the following, the suspicious log messages and their meaning are explained: BB data activity detected without OS data activity (a data context has been established without AP intention) BB phone activity detected without OS phone activity (a phone call is ongoing without AP intention) incoming call is in progress but the user has not answered (a traffic channel has been set up for a call by the BP, but user has not picked up on AP) BB phone activity ended much later than OS phone activity ended (a data transmission initiated by the AP took much longer to complete on the BP then the corresponding AP activity) 3 This rule has shown to cause a relatively high number of false positive events in the real world, and might be discarded or modified in future BBFW versions

5 The list below contains the events that are logged because they provide context for the classification of other events. Since for technical reasons, the timing correlation between detection of BP activity and AP activity is not in all cases immediate, the suspicious events are only logged after a certain time during which no relieving event happened. A typical example would be a sequence where a negative BB data activity detected without OS data activity event is logged, followed a second later by a BB data activity initiated by OS event that provides the justification or explanation for the previous event. In this case no suspicious event is logged as long as the positive event happens within a pre-configured timeframe (typically 5 seconds). BB data activity ended because OS data activity ended BB phone activity ended because OS phone activity ended Phone (AP) control activity related to phone call termination BB control phone activity ended BB activity was started again shortly after it has stopped BB data activity related to OS data connection termination BB data activity stopped and started again shortly BB data activity initiated by OS BB phone activity initiated by OS BB control channel activity caused by sending / receiving SMS Phone (AP) activity related to data connection initiation Phone (AP) control activity related to data connection termination Periodic 2G / 3G location update User answered the call 3. Network anomaly detection 3.1. Introduction A prerequisite for a successful over-the-air attack against the BP is the ability of the attacker to establish radio communications with the BP 4. In order to do this, the attacker needs to either gain control over a base station belonging to a legitimate network operator s network (which is non-trivial in practice in most mobile networks in the western world), or force the victim s phone onto a base station under the control of the attacker (the latter having become easy and cheap due to the proliferation of the necessary technology). There are various techniques for luring a victim s phone onto a malicious base station, and there are various methods to detect these techniques. Not all detection 4 There are other means to attack the BP via manipulated firmware upgrades etc. that are out of scope for this technical briefing, and that are covered by different protection mechanisms part of all GSMK CryptoPhone products

6 methods could be implemented in the BBFW as some of them would cause very high battery drain, or make the phone unfit for normal usage. Due to these technical constraints, the BBFW s network anomaly detection functionality is aimed primarily at detecting the most common and cheapest effective attack methods Events and warnings The BBFW logs events that are indicative of the presence of a rogue base station as persistent events because they are not going away quickly. No ciphering and operator change events always cause a popup box with a warning or request to the user to provide his opinion on the event in question (typically requesting whether the user is in an expected roaming situation, in which a change of the network operator can be considered normal behavior). A typical sequence of events that indicates the presence of an IMSI-Catcher is: a) Network force-down from 3G to 2G b) Current cell has no neighboring cells c) Connection is not encrypted In some cases a value C1 is too large warning might occur in addition. What has happened in such a case is that an attacker who wants to force all phones in the vicinity onto his malicious base station jammed the 3G bands while simultaneously providing his malicious 2G cell as an alternative. In order to ensure that the victims phones camp onto his malicious cell and not onto one that the regular official cellular network provides, the attacker may make his own cell more attractive to the phones by manipulating the C1 value upwards (which causes a phone to use this cell even if it does not have the highest receiving power value). In order to prevent the victims phones from leaving the attacker s malicious cell again, this cell does not publish a neighbor-cell-list that normally provides a list of alternative cells a phone can use. There are circumstances where each individual event can happen sometimes in isolated cases in badly configured networks, but the specific sequence of these events is a clear indicator that an IMSI-Catcher is in the vicinity. Below is the list of events and warnings with explanations of their meaning: Active connection without ciphering detected (Warning box pops up): The no encryption warning is relevant to the user even in those cases that are just normal network malfunctions. Without GSM A5 encryption on the air activated, it becomes rather trivial even for a not very sophisticated attacker to listen in passively on cellular communications. 5 For a system designed for comprehensive in-depth mobile network security monitoring based on stationary sensors aimed at detecting and localizing all types of rogue base stations, please inquire about the GSMK Overwatch system

7 No neighboring cells detected: The cell the phone is currently camping on does not advertise neighbor cells. This can sometimes happen in bad network conditions or on misconfigured networks. Without a neighbor cell list, it is hard for the phone to leave this cell. Value C1 is too large: The value C1 (in conjunction with C2, which for technical reasons cannot be retrieved from the CP500 s BP) is used to model the attractiveness of a cell. Attackers frequently use unusually high values that are not found on regular cellular networks. Location update (T3212) timer value is suspiciously small: The location update timer (T3121) describes the interval after which the mobile station will perform a location update. Normally, the value is between two and 16 hours. If it is very small, then this can be an indication of an ongoing attack, as several attack techniques use the parameter to manipulate the mobile station s behavior. Network operator change (Warning box with requestor pops up): Under normal network conditions, and if there is no international or local roaming, the network operator does not change. There are a number of attack techniques that use fake roaming to lure the phone onto a malicious base station or that use SS7-based tricks to get access to the encryption keys needed for passive interception which use fake roaming cells. The user can manually acknowledge the roaming request if he is in a legitimate roaming situation, in which case the warning is cleared. Network mode change (2G/3G): This event happens frequently during normal phone use, so it is only logged to provide context to the events listed above in order to allow better situational awareness. While this event is normal and harmless without any of the events above happening at the same time, in conjunction with one or multiple of the warnings listed above it becomes an important data point to detect an IMSI-Catcher-type attack. Just as with the BP-AP behavior correlation, there are a number of positive events that provide context to a potential negative event that can cancel out the necessity of a warning. These events are: Location update timer now has normal value BB data activity due to WiFi connectivity status change Ciphering got re-enabled after being disabled Detected neighbor cells C1 value is now normal USSD activity Location area changed - 7 -

8 If you plan to use the BBFW specifically to detect IMSI-Catchers in a specific geographic area, then it is strongly recommended to focus on the active connection without ciphering detected in combination with no neighbor cells detected events, especially when a 3G towards 2G network change has happened before them. Other warnings may pop up triggered by specific attack techniques, but not necessarily so. To weed out false positives it is recommended to have a second unit at a different location with a SIM card from the same operator (and, if possible, SIM cards bought at the same store at the same time) and compare the results. If the no ciphering warning is displayed simultaneously on both (spatially separated) locations it is likely a network problem (specifically, the network operator s home location register (HLR) having problems with handing out the encryption keys to the base stations due to some error or maintenance). Moving around a suspected IMSI-Catcher s location and verifying whether the warnings can be associated with a specific area is also a good technique to try. About GSMK GSMK Gesellschaft für Sichere Mobile Kommunikation mbh, headquartered in Berlin, Germany, is the technology leader in mobile voice encryption, secure messaging, and mobile device security. Established in 2003, the company develops, produces and markets voice and message encryption systems and mobile device security products for clients from the private and governmental sector. Its clients include military, police and public service clients as well as international organizations, mobile network operators, and enterprise customers from the banking, insurance, automotive, energy and raw materials industries. GSMK CryptoPhone products are based on client-verifiable source code employing strong cryptographic algorithms that give customers an unprecedented level of security in mobile communications. GSMK was the first and still is the only company to offer commercial smartphones with defense-grade encryption strength, comprehensive 360-degree mobile device security, and client-verifiable source code. Today, GSMK can look back at satisfied clients in over 50 countries worldwide. Copyright 2014 GSMK - 8 -

Understanding IMSI Privacy!

Understanding IMSI Privacy! Understanding IMSI Privacy Ravishankar Borgaonkar TU Berlin Swapnil Udar Aalto University Email: darshak@sec.t-labs.tu-berlin.de Blackhat USA 2014, Las Vegas, 7 th August 2014 Overview Unresolved Privacy

More information

The telephone supports 2 SIM cards. All functions are available for both SIM cards and have independent settings.

The telephone supports 2 SIM cards. All functions are available for both SIM cards and have independent settings. Samsung C6112 telephone for protection of conversations against control via a GSM service provider as well as via active and semi-active GSM interception complexes, catchers. The telephone supports 2 SIM

More information

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Transforming Security from Defense in Depth to Comprehensive Security Assurance Transforming Security from Defense in Depth to Comprehensive Security Assurance February 28, 2016 Revision #3 Table of Contents Introduction... 3 The problem: defense in depth is not working... 3 The new

More information

Wireless and Mobile Network Investigation

Wireless and Mobile Network Investigation Wireless and Mobile Network Investigation Part II.B. Techniques and Tools: Network Forensics CSF: Forensics Cyber-Security Fall 2015 Nuno Santos Summary } WiFi network investigations } Cellular network

More information

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION BREACH & ATTACK SIMULATION THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION Cymulate s cyber simulation platform allows you to test your security assumptions, identify possible security gaps and receive

More information

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 1 SYLLABUS GSM General architecture and interfaces of cellular system and the PSTN and Internet networks: BTS, MSC, Internetworking,

More information

SmartSiren: Virus Detection and Alert for Smartphones. Jerry Cheung, Starsky Wong, Hao Yang and Songwu Lu MOBISYS 2007

SmartSiren: Virus Detection and Alert for Smartphones. Jerry Cheung, Starsky Wong, Hao Yang and Songwu Lu MOBISYS 2007 SmartSiren: Virus Detection and Alert for Smartphones Jerry Cheung, Starsky Wong, Hao Yang and Songwu Lu MOBISYS 2007 Premise Smartphones have become increasingly popular. So have viruses for smartphones

More information

Semi-Active GSM Monitoring System SCL-5020SE

Semi-Active GSM Monitoring System SCL-5020SE Semi-Active GSM Monitoring System SCL-5020SE Technology Introduction: GSM networks are most popular and widespread wireless communication media across the world, having a wide customer base in Europe and

More information

GSMK. Cryptography Network Security. GSMK Oversight SS7 Firewall and Intrusion Detection System

GSMK. Cryptography Network Security. GSMK Oversight SS7 Firewall and Intrusion Detection System Cryptography Network Security GSMK Firewall and Intrusion Detection System GSMK Firewall and intrusion detection system to prevent attacks via interconnect. Protect your Network s Achilles Heel. With the

More information

GSM security country report: Thailand

GSM security country report: Thailand GSM security country report: Thailand GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin February 2013 Abstract. GSM networks differ widely in their protection capabilities against common

More information

Frequently Asked Questions (FAQ)

Frequently Asked Questions (FAQ) Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart

More information

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions IPS Effectiveness IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions An Intrusion Prevention System (IPS) is a critical layer of defense that helps you protect

More information

GSM security country report: Estonia

GSM security country report: Estonia GSM security country report: Estonia GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin September 2014 Abstract. GSM networks differ widely in their protection capabilities against common

More information

Wireless Security Security problems in Wireless Networks

Wireless Security Security problems in Wireless Networks Wireless Security Security problems in Wireless Networks Security of Wireless Networks Wireless networks are everywhere more and more electronic devices are becoming wireless However, ensuring security

More information

August 2009 Report #22

August 2009 Report #22 August 2009 Report #22 The data in this report is aggregated from a combination of sources including Symantec s Phish Report Network (PRN), strategic partners, customers and security solutions. This report

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Digital Interconnect Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively

More information

Mobile Security Fall 2013

Mobile Security Fall 2013 Mobile Security 14-829 Fall 2013 Patrick Tague Class #6 More WiFi Security & Privacy Issues WiFi Security Issues A Scenario Internet Open AP SSID Network X Open OpenAP AP SSID Attacker Network X LaptopLaptop

More information

Detecting MAC Spoofing Using ForeScout CounterACT

Detecting MAC Spoofing Using ForeScout CounterACT Detecting MAC Spoofing Using ForeScout CounterACT Professional Services Library Introduction MAC address spoofing is used to impersonate legitimate devices, circumvent existing security mechanisms and

More information

Security for SIP-based VoIP Communications Solutions

Security for SIP-based VoIP Communications Solutions Tomorrow Starts Today Security for SIP-based VoIP Communications Solutions Enterprises and small to medium-sized businesses (SMBs) are exposed to potentially debilitating cyber attacks and exploitation

More information

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS Overview Cyberattacks are increasingly getting more frequent, more sophisticated and more widespread than ever

More information

Chapter 2. Literature Survey. 2.1 Remote access technologies

Chapter 2. Literature Survey. 2.1 Remote access technologies Chapter 2 Literature Survey This chapter presents a brief report on literature reviewed in context to present work with an aim to identify current state of research in the domain. Literature review is

More information

The Case for Secure Communications

The Case for Secure Communications Whitepaper The Case for Secure Communications The tapping of voice communications has occurred virtually as long as electronic communication has been in existence. In the early days of electronic communications,

More information

The Internet of Things. Steven M. Bellovin November 24,

The Internet of Things. Steven M. Bellovin November 24, The Internet of Things Steven M. Bellovin November 24, 2014 1 What is the Internet of Things? Non-computing devices...... with CPUs... and connectivity (Without connectivity, it s a simple embedded system)

More information

Mobile Security Fall 2013

Mobile Security Fall 2013 Mobile Security 14-829 Fall 2013 Patrick Tague Class #4 Telecom System Security General Vulnerabilities Service interruption vulnerabilities Due to increased capacity offered by high speed communication

More information

Requirements from the

Requirements from the Requirements from the collaborative Protection Profile for Network Devices Extended Package (EP) for Wireless Intrusion Detection/Prevention Systems (WIDS/WIPS) Version: 1.0 2016-10-06 National Assurance

More information

NETWORK SECURITY. Ch. 3: Network Attacks

NETWORK SECURITY. Ch. 3: Network Attacks NETWORK SECURITY Ch. 3: Network Attacks Contents 3.1 Network Vulnerabilities 3.1.1 Media-Based 3.1.2 Network Device 3.2 Categories of Attacks 3.3 Methods of Network Attacks 03 NETWORK ATTACKS 2 3.1 Network

More information

Complying with RBI Guidelines for Wi-Fi Vulnerabilities

Complying with RBI Guidelines for Wi-Fi Vulnerabilities A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Reserve Bank of India (RBI) guidelines

More information

Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall

Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall F5 White Paper Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall Organizations need an end-to-end web application and database security solution to protect data, customers,

More information

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat WHITE PAPER Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat Executive Summary Unfortunately, it s a foregone conclusion that no organisation is 100 percent safe

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

TAKING NETWORK TESTING TO THE NEXT LEVEL

TAKING NETWORK TESTING TO THE NEXT LEVEL TAKING NETWORK TESTING TO THE NEXT LEVEL WELCOME TO THE NEXT LEVEL OF NETWORK TESTING. Do you understand the performance and customer experience of your mobile network? P3 does. Our holistic approach is

More information

Automotive Anomaly Monitors and Threat Analysis in the Cloud

Automotive Anomaly Monitors and Threat Analysis in the Cloud Automotive Anomaly Monitors and Threat Analysis in the Cloud Dr. André Weimerskirch Vector Automotive Cyber Security Symposium October 12, 2017 Cybersecurity Components Secure Internal & External Communications

More information

Snort: The World s Most Widely Deployed IPS Technology

Snort: The World s Most Widely Deployed IPS Technology Technology Brief Snort: The World s Most Widely Deployed IPS Technology Overview Martin Roesch, the founder of Sourcefire and chief security architect at Cisco, created Snort in 1998. Snort is an open-source,

More information

Sobering statistics. The frequency and sophistication of cybersecurity attacks are getting worse.

Sobering statistics. The frequency and sophistication of cybersecurity attacks are getting worse. Sobering statistics The frequency and sophistication of cybersecurity attacks are getting worse. 146 >63% $500B $3.8M The median # of days that attackers reside within a victim s network before detection

More information

NETWORK THREATS DEMAN

NETWORK THREATS DEMAN SELF-DEFENDING NETWORK NETWORK THREATS DEMAN NEW SECURITY: STRATEGIES TECHNOLOGIES Self-Propagating Threats A combination of: self propagating threats Collaborative applications Interconnected environments

More information

Cell Catcher CC1900 3G Target Identifier + IMSI Catcher + Phone Tracking

Cell Catcher CC1900 3G Target Identifier + IMSI Catcher + Phone Tracking The Cell Catcher model CC1900 tracks criminal cell phones on location, through UMTS networks, collecting and analyzing surveillance data of IMSI and IMEI numbers. 3G UMTS Gateway Technologies The Cell

More information

NEVIS Smart Solutions against sophisticated attackers

NEVIS Smart Solutions against sophisticated attackers NEVIS Smart Solutions against sophisticated attackers Stephan Schweizer NEVIS Product Manager March 2016 1 AdNovum at a Glance Enterprise-scale software and security solutions Founded in 1988, privately

More information

ABSTRACTING CONNECTIVITY FOR IOT WITH A BACKHAUL OPERATOR

ABSTRACTING CONNECTIVITY FOR IOT WITH A BACKHAUL OPERATOR ABSTRACTING CONNECTIVITY FOR IOT WITH A BACKHAUL OPERATOR NIGEL CHADWICK VIDEO TRANSCRIPT Welcome! What s your name and what do you do? Hi, it s Nigel Chadwick. I m one of the founders of Stream Technologies.

More information

Motorola AirDefense Retail Solutions Wireless Security Solutions For Retail

Motorola AirDefense Retail Solutions Wireless Security Solutions For Retail Motorola AirDefense Retail Solutions Wireless Security Solutions For Retail Wireless Risks in Retail The PCI Security Standards Council is an open global forum, founded by American Express, Discover Financial

More information

RSA INCIDENT RESPONSE SERVICES

RSA INCIDENT RESPONSE SERVICES RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access

More information

Positive Technologies Telecom Attack Discovery DATA SHEET

Positive Technologies Telecom Attack Discovery DATA SHEET Positive Technologies Telecom Attack Discovery DATA SHEET PT TELECOM ATTACK DISCOVERY DATA SHEET CELLULAR NETWORK SECURITY COMPLICATIONS As is shown in the network analysis performed by Positive Technologies

More information

Network Security and Cryptography. December Sample Exam Marking Scheme

Network Security and Cryptography. December Sample Exam Marking Scheme Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers

More information

Security Philosophy. Humans have difficulty understanding risk

Security Philosophy. Humans have difficulty understanding risk Android Security Security Philosophy Humans have difficulty understanding risk Safer to assume that Most developers do not understand security Most users do not understand security Security philosophy

More information

Express Monitoring 2019

Express Monitoring 2019 Express Monitoring 2019 WHY CHOOSE PT EXPRESS MONITORING PT Express Monitoring provides a quick evaluation of the current signaling network protection level. This service helps to discover critical vulnerabilities

More information

Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria

Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria Evaluation: assessing whether a product has the security properties claimed for it. Certification: assessing whether a

More information

Short Message Service (SMS)

Short Message Service (SMS) TECQUI Ayra M.-B. Short Message Service (SMS) Introduction Short message service is a mechanism of delivery of short messages over the mobile networks. It is a store and forward way of transmitting messages

More information

An Intrusion Detection System for Critical Information Infrastructures Using Wireless Sensor Network Technologies

An Intrusion Detection System for Critical Information Infrastructures Using Wireless Sensor Network Technologies An Intrusion Detection System for Critical Information Infrastructures Using Wireless Sensor Network Technologies The Fifth international CRIS conference on Critical Infrastructures Beijing China, 20 September

More information

AAD - ASSET AND ANOMALY DETECTION DATASHEET

AAD - ASSET AND ANOMALY DETECTION DATASHEET 21 October 2018 AAD - ASSET AND ANOMALY DETECTION DATASHEET Meaningful Insights with Zero System Impact Classification: [Protected] 2018 Check Point Software Technologies Ltd. All rights reserved. This

More information

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n CYBETBIT in a Nutshell A leader in the development and integration of Cyber Security Solutions A main provider of Cyber Security solutions for the

More information

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services Managing IT Risk: What Now and What to Look For Presented By Tina Bode IT Assurance Services Agenda 1 2 WHAT TOP TEN IT SECURITY RISKS YOU CAN DO 3 QUESTIONS 2 IT S ALL CONNECTED Introduction All of our

More information

Office 365 Buyers Guide: Best Practices for Securing Office 365

Office 365 Buyers Guide: Best Practices for Securing Office 365 Office 365 Buyers Guide: Best Practices for Securing Office 365 Microsoft Office 365 has become the standard productivity platform for the majority of organizations, large and small, around the world.

More information

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

White Paper. Why IDS Can t Adequately Protect Your IoT Devices White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity

More information

TamoSoft Throughput Test

TamoSoft Throughput Test TAKE CONTROL IT'S YOUR SECURITY TAMOSOFT df TamoSoft Throughput Test Help Documentation Version 1.0 Copyright 2011-2016 TamoSoft Contents Contents... 2 Introduction... 3 Overview... 3 System Requirements...

More information

NGN: Carriers and Vendors Must Take Security Seriously

NGN: Carriers and Vendors Must Take Security Seriously Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place

More information

WHITEPAPER THE EVOLUTION OF APPSEC: FROM WAFS TO AUTONOMOUS APPLICATION PROTECTION

WHITEPAPER THE EVOLUTION OF APPSEC: FROM WAFS TO AUTONOMOUS APPLICATION PROTECTION WHITEPAPER THE EVOLUTION OF APPSEC: FROM WAFS TO AUTONOMOUS APPLICATION PROTECTION 2 Web application firewalls (WAFs) entered the security market at the turn of the century as web apps became increasingly

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

RSA INCIDENT RESPONSE SERVICES

RSA INCIDENT RESPONSE SERVICES RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access

More information

White Paper. Blockchain alternatives: The case for CRAQ

White Paper. Blockchain alternatives: The case for CRAQ White Paper Blockchain alternatives: The case for CRAQ Blockchain technology continues to gain attention as the foundation of the bitcoin economy. Given the rapid gain in popularity of bitcoin, it s no

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

DATA SHEET MODEL AXC1000 HIGHLIGHTS OVERVIEW. Redefining Enterprise Wireless Management

DATA SHEET MODEL AXC1000 HIGHLIGHTS OVERVIEW. Redefining Enterprise Wireless Management DATA SHEET Redefining Enterprise Wireless MODEL AXC1000 HIGHLIGHTS OVERVIEW TurboRF maximizes WLAN performance VisualSec - a comprehensive and visible security protection mechanism FlowPath - 1-7 layer

More information

Mobile network security report: Ukraine

Mobile network security report: Ukraine Mobile network security report: Ukraine GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin June 2017 Abstract. Mobile networks differ widely in their protection capabilities against common

More information

On the Radar: Positive Technologies protects against SS7 network vulnerabilities

On the Radar: Positive Technologies protects against SS7 network vulnerabilities On the Radar: Positive Technologies protects against SS7 network vulnerabilities PT SS7 Attack Discovery detects SS7 network intrusions Publication Date: 14 Feb 2017 Product code: IT0022-000885 Andrew

More information

HOLISTIC COMMUNICATIONS SECURITY

HOLISTIC COMMUNICATIONS SECURITY HOLISTIC COMMUNICATIONS SECURITY BLACK TIGER COUNTERING CYBER TERRORISM HOLISTIC COMMUNICATIONS SOLUTION LACSMI is leading vendor in telecommunications since 1992 promoting set of security solutions worldwide

More information

Advanced Threat Defense Certification Testing Report. Symantec Corporation Symantec Advanced Threat Protection

Advanced Threat Defense Certification Testing Report. Symantec Corporation Symantec Advanced Threat Protection Advanced Threat Defense Certification Testing Report Symantec Advanced Threat Protection ICSA Labs Advanced Threat Defense December 8, 2015 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg,

More information

OpenWay by Itron Security Overview

OpenWay by Itron Security Overview Itron White Paper OpenWay by Itron OpenWay by Itron Security Overview Kip Gering / R. Eric Robinson Itron Marketing / Itron Engineering 2009, Itron Inc. All rights reserved. 1 Executive Summary 3 Intent

More information

Zimperium Global Threat Data

Zimperium Global Threat Data Zimperium Global Threat Report Q2-2017 700 CVEs per Year for Mobile OS 500 300 100 07 08 09 10 11 12 13 14 15 16 17 Outdated ios Outdated ANDROID 1 of 4 Devices Introduces Unnecessary Risk 1 out of 50

More information

GSME proposals regarding mobile theft and IMEI security

GSME proposals regarding mobile theft and IMEI security GSM Europe The European interest group of the GSM Association http://www.gsmeurope.org GSME proposals regarding mobile theft and IMEI security The question of mobile theft and ways of combating it has

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

The Cellular Interceptor CC2800 Series

The Cellular Interceptor CC2800 Series The Cellular Interceptor CC2800 Series Operational Parameters The Target Mode enables the user to direct cellular interception by variables such as the IMSI, TMSI, or cellular phone number of the suspect.

More information

n Explain penetration testing concepts n Explain vulnerability scanning concepts n Reconnaissance is the first step of performing a pen test

n Explain penetration testing concepts n Explain vulnerability scanning concepts n Reconnaissance is the first step of performing a pen test Chapter Objectives n Explain penetration testing concepts n Explain vulnerability scanning concepts Chapter #4: Threats, Attacks, and Vulnerabilities Vulnerability Scanning and Penetration Testing 2 Penetration

More information

IBM Cloud Internet Services: Optimizing security to protect your web applications

IBM Cloud Internet Services: Optimizing security to protect your web applications WHITE PAPER IBM Cloud Internet Services: Optimizing security to protect your web applications Secure Internet applications and APIs against denialof-service attacks, customer data compromise, and abusive

More information

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk Wayward Wi-Fi How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk 288 MILLION There are more than 288 million unique Wi-Fi networks worldwide. Source: Wireless Geographic Logging

More information

Malware, , Database Security

Malware,  , Database Security Malware, E-mail, Database Security Malware A general term for all kinds of software with a malign purpose Viruses, Trojan horses, worms etc. Created on purpose Can Prevent correct use of resources (DoS)

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

Threat patterns in GSM system. Basic threat patterns:

Threat patterns in GSM system. Basic threat patterns: Threat patterns in GSM system Usage of mobile devices in business simpli es, speeds up and optimizes business processes. However, it is necessary to understand that the more complicated the device is the

More information

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions Meeting PCI DSS 3.2 Compliance with Solutions Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 2018, Inc. What s Changing with PCI DSS? Summary of PCI Business

More information

Mavenir Keynote. Think Smarter Secure communication Innovate Services. By Mohamed Issa Regional Head of Africa Sales

Mavenir Keynote. Think Smarter Secure communication Innovate Services. By Mohamed Issa Regional Head of Africa Sales Mavenir Keynote Think Smarter Secure communication Innovate Services By Mohamed Issa Regional Head of Africa Sales The New Mavenir: Combining Market Leaders Combing three industry-leading companies to

More information

Computer Security Policy

Computer Security Policy Administration and Policy: Computer usage policy B 0.2/3 All systems Computer and Rules for users of the ECMWF computer systems May 1995 Table of Contents 1. The requirement for computer security... 1

More information

WLAN Troubleshooting Using AirCheck Wi-Fi Tester

WLAN Troubleshooting Using AirCheck Wi-Fi Tester WLAN Troubleshooting Using AirCheck Wi-Fi Tester AirCheck Troubleshooting Capabilities AirCheck Wi-Fi Tester is a powerful troubleshooting tool that can help you identify and resolve many Wi-Fi related

More information

LOCATION DATA. Location information from mobile devices is typically obtained using the following:

LOCATION DATA. Location information from mobile devices is typically obtained using the following: LOCATION DATA Location information from mobile devices is typically obtained using the following: 1. Cell PING (Triangulation) 2. Stingray device 3. Wi-Fi, Bluetooth tracking 4. Apps and Web browsing 5.

More information

Imperva Incapsula Website Security

Imperva Incapsula Website Security Imperva Incapsula Website Security DA T A SH E E T Application Security from the Cloud Imperva Incapsula cloud-based website security solution features the industry s leading WAF technology, as well as

More information

Isla Web Malware Isolation and Network Sandbox Solutions Security Technology Comparison and Integration Guide

Isla Web Malware Isolation and Network Sandbox Solutions Security Technology Comparison and Integration Guide Isla Web Malware Isolation and Network Sandbox Solutions Security Technology Comparison and Integration Guide How the Two Approaches Compare and Interoperate Your organization counts on its security capabilities

More information

A Guide to Closing All Potential VDI Security Gaps

A Guide to Closing All Potential VDI Security Gaps Brought to you by A Guide to Closing All Potential VDI Security Gaps IT and security leaders are embracing virtual desktop infrastructure (VDI) as a way to improve security for an increasingly diverse

More information

SECURITY AND DATA REDUNDANCY. A White Paper

SECURITY AND DATA REDUNDANCY. A White Paper SECURITY AND DATA REDUNDANCY A White Paper Security and Data Redundancy Whitepaper 2 At MyCase, Security is Our Top Priority. Here at MyCase, we understand how important it is to keep our customer s data

More information

GSM Interception IMSI Catcher and Voice Interception

GSM Interception IMSI Catcher and Voice Interception GSM Interception IMSI Catcher and Voice Interception Part of the product line Product overview go2intercept passive: GSM interception Passive, massive, of the air. (page 3-4) go2intercept active basic:

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics Chapter X Security Performance Metrics Page 1 of 10 Chapter X Security Performance Metrics Background For many years now, NERC and the electricity industry have taken actions to address cyber and physical

More information

Validating the Security of the Borderless Infrastructure

Validating the Security of the Borderless Infrastructure SESSION ID: CDS-R01 Validating the Security of the Borderless Infrastructure David DeSanto Director, Product Management Spirent Communications, Inc. @david_desanto Agenda 2 The Adversary The Adversary

More information

Enterprise Simply Trustworthy?

Enterprise   Simply Trustworthy? Enterprise Email: Simply Trustworthy? A System Administrator s POV Contents. Email is the centerpiece of the Enterprise information system. Introduction. Pandora s box. Time for some Newthink. One system

More information

HSL SECURITY SOLUTION FOR. VoIP PHONES PROTECTION

HSL SECURITY SOLUTION FOR. VoIP PHONES PROTECTION HSL SECURITY SOLUTION FOR VoIP PHONES PROTECTION 1 VoIP Phones Protec tion...reasons to attack VoIP phones VoIP phones are everywhere even in the most classified offices and meeting rooms. 2...Reasons

More information

ARM Security Solutions and Numonyx Authenticated Flash

ARM Security Solutions and Numonyx Authenticated Flash ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware

More information

Managing Rogue Devices

Managing Rogue Devices Finding Feature Information, page 1 Information About Rogue Devices, page 1 How to Configure Rogue Detection, page 6 Monitoring Rogue Detection, page 8 Examples: Rogue Detection Configuration, page 9 Additional

More information

Security Using Digital Signatures & Encryption

Security Using Digital Signatures & Encryption Email Security Using Digital Signatures & Encryption CONTENTS. Introduction The Need for Email Security Digital Signatures & Encryption 101 Digital Signatures & Encryption in Action Selecting the Right

More information

Overview of Wi-Fi. Dr. Srikanth Subramanian CKO, Nanocell Networks Wi-Fi A Wireless Success Story

Overview of Wi-Fi. Dr. Srikanth Subramanian CKO, Nanocell Networks  Wi-Fi A Wireless Success Story Overview of Wi-Fi Dr. Srikanth Subramanian CKO, Nanocell Networks www.nanocellnetworks.com Wi-Fi A Wireless Success Story Wi-Fi present in all laptops/aps Wi-Fi Traffic trends Source: Cisco percentage

More information

S911 Bracelet Firmware and Utility. Release Note

S911 Bracelet Firmware and Utility. Release Note Document No.: Document Type: 200-RN-001 Release Note S911 Bracelet Firmware and Utility Release Note Version 2.04 Dec. 18, 2012 Copyright 2012 Laipac Technology Inc. S911 Bracelet Firmware and its Configuration

More information

Sustainable Security Operations

Sustainable Security Operations Sustainable Security Operations Optimize processes and tools to make the most of your team s time and talent The number and types of security incidents organizations face daily are steadily increasing,

More information

IMSI/IMEI Catching & Localization System. (IMSI/IMEI Catcher + Direction Finder)

IMSI/IMEI Catching & Localization System. (IMSI/IMEI Catcher + Direction Finder) IMSI/IMEI Catching & Localization System (IMSI/IMEI Catcher + Direction Finder) About Us Our intelligent, integrated and highly mobile IMSI/IMEI Catching & Localization system is used for identifying the

More information

INFORMATION SUPPLEMENT. Use of SSL/Early TLS for POS POI Terminal Connections. Date: June 2018 Author: PCI Security Standards Council

INFORMATION SUPPLEMENT. Use of SSL/Early TLS for POS POI Terminal Connections. Date: June 2018 Author: PCI Security Standards Council Use of SSL/Early TLS for POS POI Terminal Connections Date: Author: PCI Security Standards Council Table of Contents Introduction...1 Executive Summary...1 What is the risk?...1 What is meant by Early

More information

Introduction. Security Edition User Guide

Introduction. Security Edition User Guide Introduction Turbo SIM is a device with a set of pre-installed applications targeted at SMS encryption and privacy protection. Inserted in the SIM Lock together with the operator SIM card, the device can

More information

Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking

Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking NETWORK MANAGEMENT II Proxy Servers Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking resources from the other

More information

GPS Car Tracker. Easy Tracking for Automotive. User Manual by ge-tectronic Page: 1 V2.0

GPS Car Tracker. Easy Tracking for Automotive. User Manual by ge-tectronic Page: 1 V2.0 GPS Car Tracker Easy Tracking for Automotive User Manual 2014 by ge-tectronic Page: 1 Please read these instructions carefully before installing or using this product and keep the manual at handy for reference

More information